Enhancing Security of Intermediate Devices in the Connection Between IoT Devices and Cloud Service
Error Pattern Discovery in Spellchecking Using Multi-Class Confusion Matrix Analysis for the Croatian Language
A Comprehensive Dataset of Spelling Errors and Users’ Corrections in Croatian Language
Enhancing Mitigation of Volumetric DDoS Attacks: A Hybrid FPGA/Software Filtering Datapath
Evaluation of Inter-Dataset Generalisability of Autoencoders for Network Intrusion Detection
10 GBPS flow aggregation using commodity hardware
10 GBPS flow aggregation using commodity hardware
Evaluation of Inter-Dataset Generalisability of Autoencoders for Network Intrusion Detection
Study of Data Transfer Nodes Infrastructure in Enabling Big Data Movement between Research and Cloud Storage Networks
Securing IoT Services Based on Security Requirement Categories
SCADA Systems With Focus on Continuous Manufacturing and Steel Industry: A Survey on Architectures, Standards, Challenges and Industry 5.0
Supervisory Control and Data Acquisition (SCADA) Systems in Continuous Manufacturing Process Control
Surgical DDoS Filtering With Fast LPM
Hybrid hardware/software datapath for near real- time reconfigurable high-speed packet filtering
Anomaly Correction in Time Series Data for Improved Forecasting
Ranking Network Devices for Alarm Prioritisation: Intrusion Detection Case Study
Comparison of Cuckoo Hash Table and Bloom Filter for Fast Packet Filtering Using Data Plane Development Kit
Comparison of Cuckoo Hash Table and Bloom Filter for Fast Packet Filtering Using Data Plane Development Kit
Comparison of Cuckoo Hash Table and Bloom Filter for Fast Packet Filtering Using Data Plane Development Kit
Pushing the envelope: Beyond two billion IP routing lookups per second on commodity CPUs
Security research and learning environment based on scalable network emulation
Adaptable secure communication for the Cloud of Things
Lightweight and adaptable solution for security agility
Smart Detection and Classification of Application-Layer Intrusions in Web Directories
A network testbed for commercial telecommunications product testing
Modular software platform for network traffic processing in the core operating system
Quality of service mechanisms and priority management in HSPA system
NgP - Protokol za dogovor parametara
Implementing Certificate-based Authentication Protocol on Smart Cards
Security Agility Solution Independent of the Underlaying Protocol Architecture
Implementation of the transport layer independent parameters negotiation protocol
DXR : towards a billion routing lookups per second in software
Scalable software architecture for distributed MMORPG traffic generation based on integration of UrBBaN-Gen and IMUNES
Improving distributed traffic generation performance by using IMUNES network emulator
IMUNES control interface for "Linux Containers"
Forensic analysis of the Mac OS X keychain
SIP media communication establishment in IPv6/IPv4 networks without quality of service degradation
Model of SMS traffic regulation in signaling transfer point for improved security of mobile network
Security Measures For the Protection of DNS/EMU Node in the IP Multimedia Subsystem
Opportunistic Authentication Methods In New Generation Networks
60th anniversary of the Department of telecommunications
Deploying New Hash Algorithms in Secure Neighbor Discovery
Quality of service mechanisms and priority management in UMTS and HSPA system
Measurement and Analysis of Network Emulation Systems Performance
Evaluation of Standard Based Solutions Enabling Voice and SMS Services During Transition Period Towards LTE Networks
Design of the IPv4 Routing System Based On Field-Programmable Gate Arrays
Implementacija podrške za upravljanje višeodredišnim prosljeđivanjem paketa pasivnim IGMP slušanjem u programskom Ethernet prospojniku
Extending Internal Program Interfaces of Management Layer in IMUNES
Implementation of mechanisms for controlling virtual nodes in IMUNES system through remote procedure calls
Modular control of virtual node parameters in the IMUNES system
Synthetic IP / Ethernet Traffic Transmission System Based On Field- Programmable Gate Arrays
Implementation of Communication Functions Using Field- Programmable Gate Arrays
A Method For Evaluation Of IP Multimedia Subsystem Resistance To Distributed Denial Of Service Attacks
P2P-PODRŠKA ZA RASPODIJELJENU SIMULACIJU/EMULACIJU BRZIH IP MREŽA
Diagnosis and solving IP based audio signal transmission problems
SEND-based Source Address Validation for IPv6
Security in Private Communication Networks
Confidential User Data Exchange Among Digital Identity Management Systems
Risk Management In Information Resources Security Management System
DISTRIBUTED REAL-TIME SIMULATION OF HIGH SPEED IP NETWORKS
PERFORMANCE EVALUATION OF INTERNET PROXY SYSTEMS
Clustering Network Simulation: Graph Partitioning Approach
Operating System Support for Integrated Network Emulation in IMUNES
Proceedings of the 7th International Conference on Telecommunications - ConTEL2003 Volume 2 of 2
Real-Time IP Network Simulation at Gigabit Data Rates
Proceedings of the 7th International Conference on Telecommunications - ConTEL2003
Clonable network stack - concepts and potential applications
Proceedings of the 7th International Conference on Telecommunications - ConTEL2003 Volume 1 of 2
Estimating the Impact of Interrupt Coalescing Delays on Steady State TCP Throughput
An approach to education oriented TCP simulation
Telephone Traffic Routing Simulation Using Learning Automata
Automatic Translation From SDL Specification To Distributed Erlang Implementation
WWW.HR - Experiences with Web-server development and maintenance
Automatic Erlang Code Generation from SDL Specification
Laboratory for Telecommunications Software Technologies at the Faculty of Electrical Engineering and Computing at Zagreb
From the SDL Specification Toward the Erlang Implementation
Object Orientation in SDL
Specification of Erlang Applications
Methods for checking specification correctness of telecommunication processes
SDL graphical editor
Implementation of a distributed hypermedia information system based on the WWW concept
Programming Languages - models, techniques and applications
Model of a Workstation for application of learning automata into object oriented simulation of adaptive routing methods
First experiences with the World-Wide Web in Croatia
Experimental Model of Operation and Maintenance Workstation: Expert System Module for Alarm Analysis
PBX-LAN Based Local Communication System
Experimental Expert Tools for Diagnostic in Telecommunication System and Network Management
A Functional Model of Call/Service Handling Algorithms
Teaching
University undergraduate
- Computer Security (Lecturer in charge)
- Computer Security (Lecturer in charge)
- Digital Logic (Lecturer in charge)
- Digital Logic (Lecturer in charge)
- Network Programming (Lecturer in charge)
- Network Programming (Lecturer in charge)
- BSc Thesis (Lecturers)
- Final BSc Thesis (Lecturers)
- Final BSc Thesis (Lecturers)
- Project C (Lecturers)
- Project C (Lecturers)
- Software Design Project (Lecturers)
- Software Design Project (Lecturers)
- Software Design Project (Lecturers)
University graduate
- Communication Security (Lecturer in charge)
- Communication Security (Lecturer in charge)
- Network and Service Management (Lecturer in charge)
- SCADA Systems (Lecturer in charge)
- Security Threats on the Internet (Lecturer in charge)
- Master Project (Lecturers)
- Mentorship Seminar (Lecturers)
- Presentation Seminar (Lecturers)
- Project (Lecturers)
Postgraduate doctoral study programme
- Communication Protocols-Selected Topics (Lecturer in charge)
- Formalisms in Telecommunications (Lecturer in charge)
Postgraduate spec. study
- Security of computer networks (Lecturer in charge)
Competences
-
Circuits and systems
Logic circuits Programmable circuits Logic devices -
Computers and information processing
Computer networks Internet security IP networks Network security Computer security Denial-of-service attack Firewalls (computing) Honey pot (computing) Internet security Mobile security Penetration testing Software engineering Formal verification -
Communications technology
Communication networks Communication system security Computer networks Network security Internet security IP networks Mobile security Protocols Telecommunications
Pristupačnost